<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 0day padding oracle exploit on PAN-OS master key decryption? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/0day-padding-oracle-exploit-on-pan-os-master-key-decryption/m-p/510777#M106267</link>
    <description>&lt;P&gt;Ran across this and am wondering if this is truly a new 0 Day or related to a previous RCE from a little while back regarding the default Master Key?&amp;nbsp;&amp;nbsp;&lt;A href="https://twitter.com/rqu50/status/1554566757704089600" target="_blank"&gt;https://twitter.com/rqu50/status/1554566757704089600&lt;/A&gt;&amp;nbsp; There is proof of concept code for this.&lt;/P&gt;</description>
    <pubDate>Thu, 04 Aug 2022 13:49:11 GMT</pubDate>
    <dc:creator>KurtHinson</dc:creator>
    <dc:date>2022-08-04T13:49:11Z</dc:date>
    <item>
      <title>0day padding oracle exploit on PAN-OS master key decryption?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/0day-padding-oracle-exploit-on-pan-os-master-key-decryption/m-p/510777#M106267</link>
      <description>&lt;P&gt;Ran across this and am wondering if this is truly a new 0 Day or related to a previous RCE from a little while back regarding the default Master Key?&amp;nbsp;&amp;nbsp;&lt;A href="https://twitter.com/rqu50/status/1554566757704089600" target="_blank"&gt;https://twitter.com/rqu50/status/1554566757704089600&lt;/A&gt;&amp;nbsp; There is proof of concept code for this.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Aug 2022 13:49:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/0day-padding-oracle-exploit-on-pan-os-master-key-decryption/m-p/510777#M106267</guid>
      <dc:creator>KurtHinson</dc:creator>
      <dc:date>2022-08-04T13:49:11Z</dc:date>
    </item>
    <item>
      <title>Re: 0day padding oracle exploit on PAN-OS master key decryption?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/0day-padding-oracle-exploit-on-pan-os-master-key-decryption/m-p/511649#M106354</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/194680"&gt;@KurtHinson&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for bringing this to the LiveCommunity's attention. I would also recommend bringing this up with your SE to raise more awareness towards the ability of this code to determine whether or not a default master key is being used. It does not look like an immediate risk for RCE, but for best practice please modify the master key prior to deploying firewalls in your environment.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Aug 2022 04:49:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/0day-padding-oracle-exploit-on-pan-os-master-key-decryption/m-p/511649#M106354</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2022-08-12T04:49:11Z</dc:date>
    </item>
  </channel>
</rss>

